A Blind SQL Injection vulnerability exists in iNet Online Community, which allows an attacker to execute arbitrary SQL commands on the underlying database. The vulnerability is due to insufficient sanitization of user-supplied input in the 'id' parameter of the 'profile_social.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL commands to the vulnerable script. Successful exploitation of this vulnerability can result in unauthorized access to sensitive information stored in the database, such as user credentials, or even full system compromise.
With a huge variety of features and options, at an extremely affordable price, Swoopo Clone is the ultimate script for starting your highly profitable online bidding website just like the big boys.Swoopo Clone is written... A SQL injection vulnerability exists in the 'show' parameter of the 'index.php' page, which can be exploited to execute arbitrary SQL commands in the back-end database.
This PoC generates a .txt document and crashes Scite exploiting a local Buffer Overflow. The exploit uses a payload of 4092 A characters followed by 4 NOP instructions. The exploit is tested on Linux 2.6.31-22 and is applicable to Scite version 1.76.
RM Downloader 3.1.3 is vulnerable to a local stack buffer overflow. By sending a specially crafted .m3u file, an attacker can overwrite the SEH and execute arbitrary code. The vulnerability is caused by the application not properly validating the length of user-supplied data before copying it to a fixed-length buffer.
The I-net MLM script has auth bypass vulnerability by using ' or 1=1 or ''=' in both username and password the attacker can get the access.
i Net job search engine script eliminates your worry about searching for an employer. Because our search engine software is an extensive and powerful script written in PHP, thus enabling you to launch your own jobs search portal. It has a potential to fix results from 300 major jobsites in 18 countries & thereby indexing nearly 80,000 jobs per day. This fixed list can be indexed by category, location, positions or relevance. Additionally it can also be utilized as a job site. We provide you with the newest features of major employment sites out there. It also helps the back office for the administrators providing full control over the website, structure and content management, detailed user management, statistics and many more. Our job search script is built with a focus on increased ease for users and webmasters together. Get rid of worrying about your competitors, since fixing 80,000 new pages every day from major employment sites.
A vulnerability in the Joomla Service Upload script allows an attacker to upload malicious files to the server. The attacker can upload a malicious file with a double extension such as ‘evil.php.jpg’ and access it via the URL http://[site]/img/evil.php.jpg. This allows the attacker to execute arbitrary code on the server.
This module exploits a stack over flow in BlazeDVD 6.0. When the application is used to open a specially crafted plf file, a buffer is overwritten allowing for the execution of arbitrary code. Set the EXITFUNC to seh or thread for best results.
This vulnerability allows an attacker to inject malicious SQL code into the vulnerable parameter of the website. This can be exploited to gain access to the database and extract sensitive information such as usernames, passwords, and other confidential data.
FoxPlayer 2 is vulnerable to a buffer overflow when a specially crafted .m3u file is opened. This can be exploited to execute arbitrary code by tricking a user into opening a malicious .m3u file.